This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.
The biomarker significance of three chemokines (CXCL8, CXCL10 and CXCL16) was evaluated in sera of 45 breast cancer (BC) and 28 benign breast lesion (BBL) patients, as well as 20 control women. Clinical stage and tumor expression of estrogen (ER), progesterone (PgR) and human epidermal growth factor receptor-2 (HER-2) receptors were considered in this evaluation. The results demonstrated that CXCL8, CXCL10 and CXCL16 showed a significant increased median in BC and BBL patients compared to control (CXCL8: 47.3 and 25.7 vs. 15.0; CXCL10: 37.6 and 30.7 vs. 13.1; CXCL16; 27.9 and 25.2 vs. 19.2 pg/ml, respectively). The increased levels of CXCL8 and CXCL16 were more pronounced in triple-negative and HER-2 positive p
... Show MoreThe value of culture in its interaction is composed and formulated according to compatible and incompatible roles which view the identity that adopts that formation although it is in most cases perceived and declared. The attraction and difference characteristic might be implied within subjective and procedural meaning through which it seeks to make the identity mobile subject to identity- shaping cultural causes implying the conflicts that take the shape and culture of real time. As for the end of the twentieth century and afterward where the concepts of hegemony, globalization, cultural invasion, colonial and imperial culture, all these causes made the cultural identity concept appear on the surface of the critical studies as a
... Show Moreeroticism formed a basic focus in contemporary studies and caused a problematic clash in terms of terminology, as some interpreted it by pornography and another interpreted it as aesthetic, so this research came to seek to decipher this terminological clash, and to be known as erotech in terms of cognitive significance, Accordingly, the research culminated in four chapters. The first chapter (Methodological Framework) talks about the research problem that came according to the following question: “How is the erotic act built in the theatrical text and what are the epistemic connotations that express its subjectivity? Then followed by the importance of research and the need for it, then the objective of the research, and the boun
... Show MoreThe search (floors and transparent role in the design studios satellite channels) and presented as a study-oriented, and the research aims to identify the role of flooring transparent spaces studios satellite channels and side performative and aesthetic, and formulas design to highlight the role floors transparent spaces studios satellite channels. And highlight the importance of research, particularly in its contribution to the clarification of the concept of the relationship between transparency and performing aesthetic treatments for floors by clarifying its role in the designs of the internal spaces of the studios, as well as his contribution to the founding of the theory of looking at the base of such concepts. To achieve the object
... Show MoreAbstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreThis paper studies the behavior of axially loaded RC columns which are confined with carbon fiber reinforced polymers’ sheet (CFRP) and steel jackets (SJ). The study is based on twelve axially loaded RC columns tested up to failure. It is divided into three schemes based on its strengthening type; each scheme has four columns. The main parameters in this study were the compressive strength of the concrete and steel reinforcement ratio. Furthermore, the results of the experimental test showed a substantial enhancement in the column's load-carrying capacity. When compared to the original columns, the CFRP sheet had a significant effect on improving the ductility of the column by increasing the axial deformation by about 59.2 to 95.7
... Show MoreIntroduction: Melanin is a high-molecular weight pigment produced through the oxidative polymerization of phenolic or indolic compounds and plays a perfect role in UV-light shielding, as well as in photoprotection. Among biopolymers, melanin is unique in many aspects. This study is designed to screen Production, extraction and characterizes of an extracellular melanin pigment from clinically isolated P. aeruginosa. Objective: The aim of the current study is isolation and diagnosis of P.aeruginosa using vitek-2 compact system and screening the ability to produce melanin and characterization of extracted melanin by UV-vis, FTIR, XRD and SEM. Materials and methods: the samples swab inoculated on cetrimide agar as selective media and incubated
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More